Add Research

Get your company's research in the hands of targeted business professionals.

Data Replication refers to a data storage and backup strategy that copies data from a host computer to another computer, which may or may not be at a remote location. Replication over a computer network can make data backup entirely independent of local data center physical storage.

For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server.

Journaling is a powerful feature, one that IBM has continued to develop and improve over the years. Yet, depending upon your business requirements, you probably still need more protection against downtime than journaling alone can provide. This white paper will cover what you need to know about journaling, what it can do and how it supports and cooperates with high availability software.

This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution.

This paper presents an overview of iSeries high availability to companies that are beginning to explore this powerful business continuity technology. The critical components of high availability solutions are detailed in this paper, including data replication engines, system monitors, role swap capabilities, and the importance of autonomic processes.

Download this case study today to learn more about how ARA was able to complete a datacenter migration in a compressed window, and how they continue to use ZVR to deliver aggressive service levels across their infrastructure with a product that is very easy to use.

The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.

Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.

Cleversafe commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) that enterprises may realize by using Cleversafe object storage.

In this white paper, we’ll explore the difference between two different approaches and highlight where and how dedicated servers can not only give you better performance, reliability, control and security, but can be just as attractive as cloud in terms of both flexibility and cost efficiency.

Learn how a Cloudant account can be hosted within a multi-tenant Cloudant cluster, or on a single-tenant cluster running on dedicated hardware hosted within a top-tier cloud provider like Rackspace or IBM SoftLayer.

Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) global enterprises may realize by using Mimecast’s Unified Email Management (UEM) solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the full Mimecast UEM service on their organizations. Mimecast UEM is a suite of email security, archiving, and continuity services, which can also be purchased separately if required.

In this paper, we highlight the features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components, with a particular focus on the role that storage plays in the evolution of the data center.

When faced with their EqualLogic replication not completing due to limited WAN bandwidth and consistently missing their RPO, ZLTO needed a solution. Learn how Silver Peak’s virtual appliances reduced their bandwidth used for replication by 86%.

Go hybrid and get the best of both data protection worlds. Cloud-connected backup and recovery seamlessly combines cloud-based and onsite data protection technologies for fast, local restores and ensured, offsite disaster recovery.
Read the white paper to:
. Discover the benefits of transitioning from tape to disk
. Learn how to get shorter backup windows and faster recovery times
. Ensure your data is totally secure and easily recovered

CHALLENGE:
Florida Hospital performs recovery tests twice a year, recovering more than 100 applications. The healthcare organization needed a recovery strategy that improved communication and efficiency, managed a complex change control process, and that would keep staff at home during a disaster.
SunGard Solution:
With the Managed Recovery Program, SunGard is Florida Hospital's recovery team, ensuring recovery configurations keep pace with production changes, managing recovery test execution, and providing a single point of contact for the complete recovery program.

Evaluator Group worked with HP to access the features, performance and enterprise capabilities of the HP StoreOnce B6200 Backup system. HP labs and equipment were utilized, with testing under the direction of on-site Evaluator Group personnel. Testing focused on validating high availability features, performance, and application integration.